There are concerns about plans to install Chinese-owned technology on a supercomputer used by government agencies and Australian universities.
A recent analysis from security company Zscaler reveals the IoT devices that are most at risk of attack.
Just how secure are text-based passwords, really? Associate Professor Gao Debin from Singapore Management University has shown the need for alternatives to the ubiquitous, text-based user authentication method.
Australian cities Sydney and Melbourne rank 12th and 15th in the world respectively for cyber attack threat, with the entire nation at risk of losing $16 billion, according to a new global threat report.
Research from ANU shows executive/board knowledge of cyber risks among medium sized businesses is inadequate and board-level governance of cyber security risks varies wildly between organisations.
A security researcher has come up with an unconventional solution to protect IoT devices against Mirai, a DDoS source code that has been wreaking havoc over the past month
Users of Schneider Electric’s Unity Pro software are urged to download an upgrade, after a vulnerability was discovered in the software.
A bunch of ‘he said, she said’ has erupted as IBM details where it all went wrong with Australia’s 2016 Census.
The CSIRO’s digital research unit Data61 has opened its Cyber Security and Innovation Hub, which is expected to create 140 jobs over the next three years.
A recent study from the National Institute of Standards and Technology (NIST) has found that ‘cyber security fatigue’ is taking over, causing computer users to make risky decisions.
According to the NSW Minister for Industry, Resources and Energy, NSW will aim to meet its renewable energy target as per the Paris agreement. However, fossil fuels aren’t going anywhere, writes Stephanie Stefanovic.
A group of physicists from the University of Calgary in Canada have set a new record for distance of transferring a quantum state by teleportation, which is an important step towards achieving quantum communications.
The internet has brought us many great things but it has made us more vulnerable. Protecting against such futuristic violence as cyber war is one of the key challenges of the 21st century.
The ambient light sensors used in smartphones, tablets and notebooks on a number of browsers could be monitoring and gathering information on their users in ways that compromise their privacy.
With the outsourcing of microchip design and fabrication worldwide, bad actors along the supply chain have many opportunities to install malicious circuitry in chips. Researchers from NYU are finding a way to detect this.
Engineers have disputed claims that the failure of ABS’ Census website was caused by overseas hackers.
Icon Labs has released a low-cost, compact industrial firewall appliance.
Cyber security is about more than just protecting computer systems. In 2014, hackers caused massive damage to a German steel mill, after a cyber attack disrupted its control system, preventing a blast furnace from shutting down. More recently, hackers hijacked the systems of two power distribution companies in Ukraine and cut power to more than … Continue reading 5 ways to protect industrial networks from cyber attack
With computerised control systems operating everything from power plants, water treatment facilities to transport systems and factories, the potential for disruptive cyber attacks grows bigger by the week.
GE’s Control Solutions business line, a division of GE Measurement & Control, today announced its Bronze accreditation in Achilles Practices Certification (APC) by Wurldtech, an independent subsidiary of GE and market leader in industrial cyber security certification standards.